BYOD: Bring Your Own… Demons?
Save 40% when upgrading to Creative Cloud : For existing CS3 or later customers
This article is from guest blogger
Natalia David, writer.
Bring Your Own Devices (BYOD) is a topic that has hogged online forums and corporate discussions alike ever since the trend has been used in the business world.
This trend of asking employees to bring their own devices – like smart phones, laptops and tablets – to work, has been gleefully accepted by the employees, since it saves them from the inconvenience of carrying scores of devices all day long.
Even so, the employees still have quasi-nightmares owing to BYOD – and not only because of the hindrance in installing employee monitoring software.
So before we delve into the roots of the said nightmare, it is imperative to go through reasons which make BYOD a fruitful practice for the employers as well.
The Glass Half Full? Economics
For starters, firms can save money – quite a lot of it at that – owing to BYOD programs.
According to a report by Good Technology State of BYOD, half of the companies that have BYOD models ask the employees to cover the devices’ cost.
And hence this reduces the company bill significantly, especially since these devices are purchased by the employees themselves as well.
The Glass Half Full? Machine preference
Another factor behind employees preferring to bring their own devices is because they are the devices they prefer.
Their own devices are the ones that they obviously find the most user-friendly and comfortable to work on.
A survey conducted by iPass reveals that employees that use the same devices for both their own and official purposes actually put in around 240 hours more than those that do not.
Also, since the employees are the ones bringing their devices to work, there is more than a fair chance that their preferred device would be more technologically advanced.
And so the company gets to reap the benefits of more efficiency owing to the use of latest technology.
The Glass Half Empty? Security concerns for the employer
All the negative hoopla that encompasses BYOD is due to the obvious security concerns.
The firms would not want malware – like spy software for cell phones for example – to infect their firms; and since the devices are all interconnected, one infected machine could wreck havoc with the entire company.
Data leakage is a major concern, and you don’t only need spy software for cell phones to extract a company’s data – if an employee’s cell phone is stolen then that could potentially suffice.
The Glass Half Empty? Acceptable Use policy – or not…
Secondly the acceptable use of devices is another major issue.
The devices that the company would provide come with an acceptable use policy, which would not be the case when employees use their own machines.
And this in turn also makes data retrieving difficult when a staff member is about to leave a company.
Yes, you have the employee monitoring software for your help, but that does not mean that data arrangement and ensuring that an outgoing employee does not end up revealing your secrets won’t be a tiring prospect.
The Demons Broke the Glass
While there might be other causes of apprehension, the fact that devices have now become technological demons, due to their ability to transfer invaluable data with a few hacking maneuvers is what scares the employees the most.
Researchers are working on ways to make BYOD a secure exercise for firms, but till that is conjured up the doubting Thomas shall live on.
And till they’re countered, Mr Thomas shall be petrified of these demons.
Other articles by this writer
The HRIS World Research Network
How Intel’s Core vPro Chips Are Security Lifelines – bit.ly/NpqtTQ
About Our Guest Blogger
More articles by Our Audience...
- Latest Technology Requires Higher Skill Levels -- Get Training! - 18-February-2013
- 10 Techniques to Effective Applicant Tracking - 14-February-2013
- Are You Learning Project Management the Right Way? - 14-February-2013
- How Do Those Headshots Get In Google Searches? - 13-February-2013
- Obtain A PMP Certification While Maintaining Your Work Schedule - 24-January-2013
- Entering the Workforce? What You Need to Know About Interviews - 22-January-2013
- How An Effective Absence Management Policy Can Benefit All - 17-January-2013
- What Are The Security Issues Surrounding Cloud Technology? - 11-January-2013
- The Grinch Who Stole Data - 19-December-2012
- How Cloud Systems Began: The Rise of the Virtual Machine - 12-December-2012
To leave comments, you will need to sign in or register with facebook. To have your comments posted to your own facebook wall, be sure to click the 'Post to Profile' box. To minimize spam, all comments require admin approval before they will be displayed.
Benefits for Registering with The HRIS World
Using our registration option will allow you to receive our latest articles via email (you can opt out at any time) -- either allposts or posts for specific blogs.
|5 Common Hiring Mistakes
Read more about these mistakes, and how to avoid them in this whitepaper.
Podcasts - all articles
Kindle - all blogs
RSS feeds - by blog
Some More Information for You...
For the latest video briefs, check out any of our 50+ playlists on our YouTube channel...ADP : Brasil IT : Brasil IT-BPO : Ceridian : Cloud Computing : Epicor : HR Tech Europe : HR Technology Conference: IHRIM : Insight UK : Intel : Kenexa : Kronos : Mobile News : OpenText : Oracle : PeopleSoft : SAGE : SAP : SHRM : Success Magazine : Taleo : TechnoFunc : TowersWatson
You will also find our Microsoft and Microsoft Office 2010 YouTube video playlists helpful with your learning...Microsoft : Microsoft Office : 365 : Access : Excel : Lync : OneNote : Outlook : PowerPoint : Web Apps : Word : Microsoft Windows phone : Publisher : Project : SharePoint Workspace : Visio
AND NOW - Previews to Microsoft Office 2013 and Microsoft Office 2013 Applications!!!Microsoft : Microsoft Office : Access : Excel : OneNote : Outlook : PowerPoint : Web Apps : Word : Microsoft Windows phone : Publisher : Project : SharePoint : Visio